Get my own profile
Public access
View all5 articles
1 article
available
not available
Based on funding mandates
Co-authors
Chase Qishi WuProfessor of Computer Science, New Jersey Institute of TechnologyVerified email at njit.edu
Qiang TangThe University of SydneyVerified email at sydney.edu.au
Shouhuai XuGallogly Chair Professor in Cybersecurity, University of Colorado Colorado SpringsVerified email at uccs.edu
Yuan LuInstitute of Software Chinese Academy of SciencesVerified email at iscas.ac.cn
Guiling (Grace) WangDistinguished Professor of College of Computing Sciences and School of Management, NJITVerified email at njit.edu
Tong SunDirector of Document Intelligence Lab, AdobeVerified email at adobe.com